Brain Dump

STRIDE

Tags
security

A [see page 62, standard] for identifying threats which is an anagram for:

TermDescription
SpoofingCan an attacker gain access using a false identity?
TamperingCan an attacker modify data as it flows through the app?
RepudiationIf an attacker denies doing something, can we prove he did it?
Information disclosureCan an attacker gain access to private or potentially injurious data?
Denial of ServiceCan an attacker crash or reduce the availability of the system?
Elevation of privilegeCan an attacker assume the identity of a privileged user?

We list a bunch of threats, describe how an attacker may exploit them and then how we should prevent that.

TODO See [see page 64, definition and examples].

Links to this note